SUSE Security Update: Security update for puppet
______________________________________________________________________________

Announcement ID:    SUSE-SU-2012:0983-1
Rating:             important
References:         #770828 #770829 #770833 
Cross-References:   CVE-2012-3864 CVE-2012-3865 CVE-2012-3867
                   
Affected Products:
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Server 11 SP1 for VMware
                    SUSE Linux Enterprise Server 11 SP1
                    SUSE Linux Enterprise Desktop 11 SP2
                    SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________

   An update that fixes three vulnerabilities is now
   available. It includes one version update.

Description:


   The following bugs have been fixed in puppet:

   * bnc#770828, CVE-2012-3864: puppet: authenticated
   clients can read arbitrary files via a flaw in puppet master
   * bnc#770829, CVE-2012-3865: puppet: arbitrary file
   delete / Denial of Service on Puppet Master by
   authenticated clients
   * bnc#770833, CVE-2012-3867: puppet: insufficient input
   validation for agent certificate names

   Security Issue references:

   * CVE-2012-3867
   
   * CVE-2012-3864
   
   * CVE-2012-3865
   


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp1-puppet-6561

   - SUSE Linux Enterprise Server 11 SP1 for VMware:

      zypper in -t patch slessp1-puppet-6561

   - SUSE Linux Enterprise Server 11 SP1:

      zypper in -t patch slessp1-puppet-6561

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp1-puppet-6561

   - SUSE Linux Enterprise Desktop 11 SP1:

      zypper in -t patch sledsp1-puppet-6561

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.17]:

      puppet-2.6.17-0.3.1
      puppet-server-2.6.17-0.3.1

   - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.6.17]:

      puppet-2.6.17-0.3.1
      puppet-server-2.6.17-0.3.1

   - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.17]:

      puppet-2.6.17-0.3.1
      puppet-server-2.6.17-0.3.1

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 2.6.17]:

      puppet-2.6.17-0.3.1

   - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.6.17]:

      puppet-2.6.17-0.3.1


References:

   https://www.suse.com/security/cve/CVE-2012-3864.html
   https://www.suse.com/security/cve/CVE-2012-3865.html
   https://www.suse.com/security/cve/CVE-2012-3867.html
   https://bugzilla.novell.com/770828
   https://bugzilla.novell.com/770829
   https://bugzilla.novell.com/770833
   https://login.microfocus.com/nidp/app/login

SuSE: 2012:0983-1: important: puppet

August 13, 2012
An update that fixes three vulnerabilities is now An update that fixes three vulnerabilities is now An update that fixes three vulnerabilities is now available

Summary

The following bugs have been fixed in puppet: * bnc#770828, CVE-2012-3864: puppet: authenticated clients can read arbitrary files via a flaw in puppet master * bnc#770829, CVE-2012-3865: puppet: arbitrary file delete / Denial of Service on Puppet Master by authenticated clients * bnc#770833, CVE-2012-3867: puppet: insufficient input validation for agent certificate names Security Issue references: * CVE-2012-3867 * CVE-2012-3864 * CVE-2012-3865 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp1-puppet-6561 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-puppet-6561 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-puppet-6561 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-puppet-6561 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-puppet-6561 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.17]: puppet-2.6.17-0.3.1 puppet-server-2.6.17-0.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.6.17]: puppet-2.6.17-0.3.1 puppet-server-2.6.17-0.3.1 - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.17]: puppet-2.6.17-0.3.1 puppet-server-2.6.17-0.3.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 2.6.17]: puppet-2.6.17-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.6.17]: puppet-2.6.17-0.3.1

References

#770828 #770829 #770833

Cross- CVE-2012-3864 CVE-2012-3865 CVE-2012-3867

Affected Products:

SUSE Linux Enterprise Server 11 SP2

SUSE Linux Enterprise Server 11 SP1 for VMware

SUSE Linux Enterprise Server 11 SP1

SUSE Linux Enterprise Desktop 11 SP2

SUSE Linux Enterprise Desktop 11 SP1

https://www.suse.com/security/cve/CVE-2012-3864.html

https://www.suse.com/security/cve/CVE-2012-3865.html

https://www.suse.com/security/cve/CVE-2012-3867.html

https://bugzilla.novell.com/770828

https://bugzilla.novell.com/770829

https://bugzilla.novell.com/770833

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2012:0983-1
Rating: important

Related News